throbber
Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 1 of 11
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 10
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 2 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 2 of 11
`
`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re of:
`Application No.:
`
`10/531,259
`
`Filing Date:
`
`April 24, 2006
`
`Examiner:
`
`Art Unit:
`
`Trang T. Doan
`
`2131
`
`First Inventor:
`
`Gisela MEISTER
`
`Customer No.:
`
`23364
`
`Attorney No.:
`
`MEIS3002JEK
`
`Confirmation No.:
`
`4669
`
`For:
`
`METHOD FOR CARRYING OUT A SECURE ELECTRONIC
`TRANSACTION USING A PORTABLE DATA SUPPORT
`
`RESPONSE TO OFFICE ACTION MAILED MARCH2, 2010
`
`Commissioner for Patents
`-
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Sir:
`
`INTRODUCTORY COMMENTS
`
`This is responsive to the Office Action mailed March 2, 2010 with regard to the above
`identified application. Reconsideration of this application is requested in view of the
`amendments and comments presented below.
`
`AMENDMENTS
`
`Amendments to the Claims
`The claims are amended as shownin the following pages under the heading “LIST OF
`CURRENT CLAIMS”. This listing of claims supersedes all prior listings of the claims
`presented in this application, shows currently proposed amendments to the claims and shows
`the status of all claims in the application.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 3 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 3 of 11
`
`Application No.: 10/531,259_
`Art Unit: 2131
`
`LIST OF CURRENT CLAIMS
`
`1. (Previously Presented) A method for effecting a secure electronic transaction on a
`terminal using a portable data carrier arranged to perform different quality user authentication
`methods, wherein the portable data carrier performs a user authentication using one of said
`different user authentication methods, the portable data carrier confirms the proof of
`authentication to the terminal, and the portable data carrier then performs a security-
`establishing operation within the electronic transaction, comprising the steps of creating
`authentication quality information by the portable data carrier about said user authentication
`method used and attaching said authentication quality mformation to the result of the
`security-establishing operation, wherein the difference in quality of user authentication varies
`between an inherently relatively lower quality and an inherently relatively higher quality
`
`from a security perspective.
`
`2. (Previously Presented) The method according to claim 1, wherein the security-
`establishing operation performed by the portable data carrier comprises creating a digital
`
`signature.
`
`3. (Previously Presented} The method according to claim 1, wherein the
`
`authentication of the user is performed by presentation of a biometric feature.
`
`4, (Previously Presented). The method according to claim 3, wherein the
`authentication of the user is performed by presentation of a physiological or behavior-based
`
`feature characteristic of a user.
`
`5, (Previously Presented) The method according to claim 1, wherein the
`authentication of the user is performed by proof of knowledge of a secret.
`
`6. (Previously Presented) The method according to claim 1, wherein at least two
`different authentication methods of different quality are offered for authentication of the user.
`
`7. (Previously Presented) The method according to claim 6, wherein the particular
`
`authentication methods not used are disabled.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 4 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 4 of 11
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`8, (Previously Presented) The method according to claim 6, wherein no quality
`information is produced for an authentication method.
`
`9. (Previously Presented) The method according to claim 1, wherein a user is asked to
`
`select an authentication method.
`
`10, (Currently Amended) A portable data carrier for performing a security-
`establishing operation within a secure electronic transaction and arranged to perform different
`quality user authentication methods, wherein the difference in quality of user authentication
`varies between an inherently relatively lower quality and an inherently relatively higher
`quality from a security perspective, comprising: whereby the portable data carrier is arranged
`to perform a user authentication using one of said implemented user authentication methods
`and the portable data carrier is arranged to confirm the authentication to a terminal, and
`wherein the data carrier is arranged to create quality information about said user
`authentication method used and to attach such quality information to the result of the security
`
`establishing operation.
`
`11. (Previously Presented) The data carrier according to claim 10, wherein the
`
`portable data carrier is set up to create a digital signature.
`
`12. (Previously Presented) The data carrier according to claim 10, wherein the data
`carrier supports at least two qualitatively different authentication methods.
`
`13. (Currently Amended) A terminal for use in connection with the portable data
`carrier according to claim [[9]] 10, said terminal including a device arranged to cause a user
`to select one of at least two possible different quality authentication methods.
`
`14. (Previously Presented) A system for effecting a secure electronic transaction
`within which the quality of authentication of a user of the system is ascertained, comprising
`the portable datacarrier according to claim 10 and the terminal according to claim 13.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 5 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 5 of 11
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`REMARKS
`
`Amendments to the Claims
`
`Claim 10 is amended to change “whereby”to “comprising:”in line 5 to more properly
`recite the inventive subject matter in terms reflecting appropriate U.S. practice. The scope
`and meaning of the claim is unchanged by the amendment.
`Claim 13 is amended to correct an obvious mistake resulting from the original claim
`
`referring back to claim 9 instead of claim 10. The claim has been amendedto properly refer
`
`back to claim 10.
`
`Claim Rejections — 35 USC §102
`The rejection of claims 1-6 and 8-14 under 35 USC §102(e) as being anticipated by
`Russo (U.S. 2003/0101348 A1) is respectfully traversed. As a starting point, the scope and
`meaning of the claims are reviewed from the perspective of a person skilled in the art based
`on the written description and drawings of the application.
`Claim 1 recites a method for effecting a secure electronic transaction on a terminal
`using a portable data carrier that is capable of performing different quality user authentication
`methods.
`It is important to note that the terminal is a separate device from the portable data
`carrier and that the portable data carrier is capable of performing a user authentication using
`one of the different user authentication methods varying between an inherently relatively
`lower quality and an inherently relatively higher quality of user authentication, and further
`wherein the data carrier creates authentication quality information about
`the user
`
`authentication method and attaches the authentication quality information to the result of the
`
`security establishing operation carried out by the portable data carrier.
`An important point to note is that the portable data carrier performs the security
`
`establishing operation after the initial user authentication procedure performed by the
`
`portable data carrier (claim 1, line 5).
`Thus, the user authentication carried out by the portable data carrier is a separate and
`distinct operation from the authentication quality information generated by the portable data
`
`cartier during a secure electronic transaction.
`language,
`The original description explains the process in more conventional
`particularly in the description spanning pages 3 and 4 of the specification. As explained in
`the paragraphs spanning pages 3 and 4, the terminal has an interface (19) for communication
`with a portable data carrier (20). The data carrier may be of the contact or non-contact type.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 6 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 6 of 11
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`The terminal includes various sensor devices (15) for sensing biometric information.
`The portable data carrier (20) may be a chip card that communicates with the terminal via the
`interface (19). Accordingly, communication between the terminal and chip card is enabled
`(specification, page 4, second paragraph).
`The portable data carrier itself is set up to perform at least one but expediently a
`plurality of different quality user authentication methods, preferably at least two different
`authentication methods having a different order of security. For example, it may support at
`least one knowledge-based authentication method (a PIN check), and at least one biometric
`method. Obviously, the biometric method inherently constitutes a higher quality method of
`authentication as compared with the knowledge-based authentication method (id., page 5,
`first paragraph). The smart card has a storage means (26) that stores at least one secret to be
`presented to the user, for example a reference PIN assigned to the user and at least one
`biometric reference data record assigned to the user.
`Of significant importance is the fact that, after the signature application has been
`started, the user presents a suitable portable data carrier (20) to the terminal (40 — step 104)
`following whichthe terminal recognizes the presence of the chip card and performs a mutual
`authentication therewith (id., step 106) wherein the chip card first proves its authenticity to
`
`the terminal and then the terminal to the chip card (id, page 6, lines 1-3).
`
`If authentication is successful, the terminal and chip card negotiate dynamic session
`
`keys to permit further communication to be conducted securely in the so-called secure
`messaging mode (id., step 108). Then, authentication ofthe user vis-a-vis the chip card 20 is
`effected. First the terminal 14 checks how authentication is to be effected (e.g., knowledge-
`
`If the authentication is by the PIN method, the user enters the PIN
`based or biometrically).
`via the input means (18) to the terminal (14) that passes it on directly or in modified form via
`the interface (19, 22) to the chip card 20 (id, page 6, penultimate paragraph). The total
`communication between terminal 14 and chip card 20 is expediently effected in the secure
`
`messaging mode.
`The chip card then checks the transmitted PIN and confirms correctness of same to
`the terminal if there is no error, or terminates the procedure if the PIN was checked as false
`
`Cid., step 116).
`If the no-error case is given, the terminal causes the chip card by corresponding
`instructions to perform the security establishing operation,
`i.e. the digital signature, and
`
`transmits the electronic document to be signed to the chip card.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 7 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 7 of 11
`
`Application No.: 10/331,259
`Art Unit: 2131
`
`The chip card signs the supplied electronic document with the secret key stored in the
`storage means 22 (step 120) and sendsthe electronic signature back to the terminal (step 122)
`
`which uses it to continue the initiated electronic transaction (id., page 7, second paragraph).
`
`If the authentication of the user is to be biometric,
`
`the terminal
`
`(14) initiates
`
`authentication against presentation of a biometric feature and makes a corresponding report to
`
`the chip card 20 (step 130).
`After the detected biometric feature is analyzed at the terminal, involving extraction
`
`of certain key features,
`
`the extracted features are then transmitted by the terminal to the
`
`portable data carrier(id., page 7, penultimate paragraph — step 138).
`it
`Significantly, when the data carrier receives the information from the terminal,
`performs a separate verification of the transmitted extracted features (step 140). The circuit
`of the data carrier compares the received extracted features with the reference features stored
`
`in the storage means of the data card and checks whether a sufficient match is present. If the
`match is correct, the data carrier confirms same to the terminal that verification of the
`
`transmitted biometric feature has been successfully carried out.
`
`Portable carrier then
`
`switches itself ready to executed the intended security establishing operation (id., paragraph
`
`spanning pages 7 and 8).
`
`Accordingly,
`
`it will be evident that,
`
`in accordance with the present invention as
`
`claimed in claim 1, it is the data carrier that performs a security establishing operation within
`
`the electronic transaction using a hardware token in the form of the portable data carrier.
`
`Initial authentication step is carried out separately from the later security establishing
`operation whereby the terminal communicates information regarding the authentication
`process to the portable data carrier that then attaches authentication quality information to the
`
`result of the security establishing operation.
`
`Claim 2 further modifies the method recited in claim 1 by reciting that the security
`
`- establishing operation performed by the portable data carrier comprises creating a digital
`
`signature.
`
`Claims 3, 4 and 5, respectively recite that the authentication of the user is performed
`by presentation of a biometric feature, a physiological or behaviour-based feature or proof of
`
`knowledge of a secret.
`
`In accordance with claim 6, at least two different authentication methods of different
`
`quality are offered for authentication of the user.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 8 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 8 of 11
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`Claim 7 specifically recites that the particular authentication methods not used by the
`
`portable data carrier are disabled (figure 2, step 112; figure 3, step 132).
`Claim 8 further modifies claim 6 by reciting that no quality information is produced
`
`for an authentication method.
`
`Claim 9 further modifies claim 1 by reciting that the user is asked to select an
`
`authentication method.
`
`Claim 10 is an independent claim reciting the portable data carrier wherein the data
`
`carrier is arranged to perform a user authentication using one of the implemented user
`
`authentication methods and further is arranged to confirm the authentication to a terminal,
`
`wherein the data carrier
`
`is arranged to create quality information about said user
`
`authentication method used and to attach such quality information to the result of the security
`
`establishing operation.
`
`Claims 11 and 12 further refine the description of the portable data carrier according
`
`to claim 10, wherein the portable data carrier is set up to create a digital signature (claim 11)
`
`or the data carrier supports at least two qualitatively different authentication methods (claim
`
`12).
`
`Claim 13 recites a terminal for use in connection with the portable data carrier
`
`according to claim 10 wherein the terminal includes a device arranged to cause a user to
`
`select at least one of two possibile different quality authentication methods.
`
`Claim 14 recites a system for effecting a secure electronic transaction within which
`
`the quality of authentication of a user of the system is ascertained, comprising the portable
`
`data carrier according to claim 10 and the terminal according to claim 13.
`
`The primary reference relied on by the examiner in rejecting claims 1-6 and 8-14,
`
`namely Russo, discloses a method and system that uses software tokens to indicate risks in
`
`connection with the authentication of a client using the system. That is, the secret (e.g. a
`
`password or private key) of a user that is used to authenticate the user against the system is
`
`associated with additional data (the so-called “software” confidence token) which data
`
`includes information (“trust metric”) about the risk that the secret is compromised. (Russo,
`
`{0039], [0043], [0044], [0047]}. The trust metric may also contain information about the
`
`strength of an authentication method that is used for user authentication (d., [0007], [0008],
`
`{0050]).
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 9 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 9 of 11
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`In addition to the aforesaid trust metric,
`
`the software token of Russo comprises
`
`transaction information Gd., [0046]) which defines the transaction that is requested by the
`user.
`
`Both transaction information and trust metric are included in an “envelope” whichis
`
`then “sealed” by means of a secret containing a digital signature in order to complete the
`
`confidence token. In general, the digital signature is created with a secret key of the user (id,
`
`[0053]) which key is part of a PKI infrastructure (id, [0038]).
`
`Whenthe server receives the confidence token,it first verifies the signature, e.g. with
`
`the respective public key of the user.
`
`If the verification is successful, the server finally
`
`determines the confidence of the transaction according to the trust metric extracted from the
`
`confidence token and completes the transaction if the level of confidence indicated by the
`
`trust metric is high enough (id., [0058-60)).
`
`Accordingly,it is clear that Russo is incapable of anticipating at least claims 1 and 10,
`
`as it fails to show,
`
`teach or suggest a portable data carrier that performs a security
`
`establishing operation within the electronic translation after the portable data carrier performs
`
`a user authentication using one of different user authentication methods. There is no teaching
`
`in Russo of using a portable data carrier in the mannerrecited in claims | and 10, particularly
`
`wherein the data carrier attaches authentication quality information to the result of a security
`
`establishing operation following aninitial user authentication procedure initiated between the
`
`portable data carrier and the terminal.
`
`While Russo mentions the use of smart cards in the written description of the
`
`published application, the smart cards are used to support a specific authentication method
`
`during user authentication (using something you have) but none of the data carriers is
`
`atranged to perform different quality user authentication methods and to perform user
`
`authentication using one of the different user authentication methods. None of the smart
`
`cards of Russo is arranged to perform a security establishing operation within the electronic
`
`transaction. Russo neither discloses nor suggests a data carrier to create an authentication
`
`quality information and to attach that authentication quality information to the result of the
`
`security establishing operation. Rather, Russo requires that the trust metric be determined by
`
`the requester in the manner explained in paragraphs 0048-0051.
`
`Russo fails to disclose any security establishing operation that is separate from a step
`
`of authenticating the user. For example, the step of sealing the envelope (id, [0024, 0053])
`
`in order to complete the confidence token, such step involving a digital signature based on a
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 10 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 10 of 11
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`secret key of the user, is basically used to authenticate the transaction, i.e. to authenticate the
`
`user requesting the transaction. The server of Russo verifies this signature based on the
`
`public key of the user (id., [0059]) wherein the server authenticates the user by verifying the
`
`signature. Thus, the digital transaction that is requested by the requester according to Russo
`
`may not even require any other security establishing operation.
`As a result, the trust metric of Russo, which may be interpreted to represent the
`authentication quality information of the present invention, cannot be attached to the result of
`
`the security establishing operation, since there is no security establishing operation disclosed
`
`within Russo and hence it cannot be a result of such an operation. According to Russo, the
`
`trust metric is attached to the transaction information (i@., [0046]) which merely defines a
`
`transaction that is requested to be performed by the server.
`
`In short,
`
`in accordance with Russo, a digital
`
`transaction is requested (not yet
`
`performed) at a server together with a quality information concerning the authentication of
`
`the user. Based on this quality information, the server decides whether or not to execute or
`
`complete the requested transaction, Contrasted with such a procedure, in accordance with the
`
`present invention,it is the data carrier after successful authentication of the user, that actually
`
`performs the security establishing operation in connection with the digital transaction and
`
`attaches an authentication quality information to the result of the security establishing
`
`operation. As a result of the invention, third parties may then evaluate the result of the
`
`transaction according to the authentication quality information.
`
`Dueto the clear absence in Russo of any teaching of features recited in independent
`
`claims 1 and 10, withdrawal of the rejection of these claims under 35 USC§i02(e) is
`
`appropriate and the same is respectfully requested. Claims 2-6, 8, 9, 11-14 are likewise
`
`patentable at least on the basis of the patentability of the claims from which they depend or
`
`which they incorporate.
`
`Claim Rejections — 35 USC §103
`
`The rejection of claim 7 as being unpatentable over Russo in view of Miyashita is
`
`respectfully traversed. For reasons given above, it is clear that Russo is not appropriate as a
`
`basic reference that may be modified by Miyashita in the manner suggested by the examiner
`
`to result in a teaching of obviousness of claim 7. Even if Miyashita is somehow incorporated
`
`within the teachings of Russo, the combination of teachingsstill fails to establish prima facie
`
`

`

`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 11 of 11
`Case 6:21-cv-01101-ADA Document 34-10 Filed 06/09/22 Page 11 of11
`
`Application No.; 10/531,259
`Art Unit: 2131
`
`obviousness of claim 7, which requires all the features of claim 1, which features are not
`
`shown or taught in Russo.
`Accordingly, withdrawal of the rejection of claim 7 under 35 USC §103(a) is
`
`appropriate and the same is respectfully requested.
`Applicant submits that this application is in condition for allowance and its passage to
`issue is respectfully requested.
`
`BACON & THOMAS, PLLC
`625 Slaters Lane, 4"" Floor
`Alexandria, VA 22314-1176
`Phone: (703) 683-0500
`Facsimile: (703) 683-1080
`Date: May 27, 2010
`
`>
`
`
`
`10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket